General
-
Target
3b117713fb73f1a6f2a44ac1087d78e3501e9c301aa4b69346dbc2b9664a24ce
-
Size
548KB
-
Sample
221021-b5h2cafce5
-
MD5
7433061971233a4134cbac454a2f736c
-
SHA1
2e2dc1d3f18df33b30d3d85633da142d48c51a84
-
SHA256
3b117713fb73f1a6f2a44ac1087d78e3501e9c301aa4b69346dbc2b9664a24ce
-
SHA512
3d26dc69dc7133c7f2ad0088fb6f077382543e52bf3193e7995058dfecb5a1f19906ac5cb3b9624760d5e74b7e30add055c1a269045b7f9d3d54cc0414502e4a
-
SSDEEP
12288:WbEtWoMZfaFtuKo5qKMnLYuyqnzN+y1kz1LxCOAwst:yloUf+o5qJnV9+y1IXs
Static task
static1
Behavioral task
behavioral1
Sample
3b117713fb73f1a6f2a44ac1087d78e3501e9c301aa4b69346dbc2b9664a24ce.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3b117713fb73f1a6f2a44ac1087d78e3501e9c301aa4b69346dbc2b9664a24ce.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
3b117713fb73f1a6f2a44ac1087d78e3501e9c301aa4b69346dbc2b9664a24ce
-
Size
548KB
-
MD5
7433061971233a4134cbac454a2f736c
-
SHA1
2e2dc1d3f18df33b30d3d85633da142d48c51a84
-
SHA256
3b117713fb73f1a6f2a44ac1087d78e3501e9c301aa4b69346dbc2b9664a24ce
-
SHA512
3d26dc69dc7133c7f2ad0088fb6f077382543e52bf3193e7995058dfecb5a1f19906ac5cb3b9624760d5e74b7e30add055c1a269045b7f9d3d54cc0414502e4a
-
SSDEEP
12288:WbEtWoMZfaFtuKo5qKMnLYuyqnzN+y1kz1LxCOAwst:yloUf+o5qJnV9+y1IXs
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-